Solved

Organizing OU's

Posted on 2004-04-22
5
487 Views
Last Modified: 2010-04-13
When setting up OU's, in my case for departments- In addition to adding the departments computers, I'm adding the users. Do people usually just add the user group, or the users and the group to the OU?
0
Comment
Question by:bluespringsit
[X]
Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people just like you are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
  • 3
  • 2
5 Comments
 
LVL 40

Accepted Solution

by:
Fatal_Exception earned 50 total points
ID: 10892380
If you want to apply Group Policies to the OU, then you must put your users in there..   So, yes, this is standard practice...

FE
0
 

Author Comment

by:bluespringsit
ID: 10892431
I was just coming back to close the question, but you beat me too it. I found that out the hard way, just now. Thanks anyway for your help.
0
 

Author Comment

by:bluespringsit
ID: 10892456
What if a user is a member of two different groups?
0
 
LVL 40

Expert Comment

by:Fatal_Exception
ID: 10892650
That is okay, but the user can only be in one OU, and that is where your GPO will take affect...  I try not to let my users populate more than one group though...
0
 
LVL 40

Expert Comment

by:Fatal_Exception
ID: 10894584
and thanks..

FE
0

Featured Post

Simplifying Server Workload Migrations

This use case outlines the migration challenges that organizations face and how the Acronis AnyData Engine supports physical-to-physical (P2P), physical-to-virtual (P2V), virtual to physical (V2P), and cross-virtual (V2V) migration scenarios to address these challenges.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

NTFS file system has been developed by Microsoft that is widely used by Windows NT operating system and its advanced versions. It is the mostly used over FAT file system as it provides superior features like reliability, security, storage, efficienc…
There is a lot to be said for protecting yourself and your accounts with 2 factor authentication.  I found to my own chagrin, that there is a big downside as well.
In this video we outline the Physical Segments view of NetCrunch network monitor. By following this brief how-to video, you will be able to learn how NetCrunch visualizes your network, how granular is the information collected, as well as where to f…
Michael from AdRem Software explains how to view the most utilized and worst performing nodes in your network, by accessing the Top Charts view in NetCrunch network monitor (https://www.adremsoft.com/). Top Charts is a view in which you can set seve…

705 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question